Review of Security Issues in Industrial Networks

被引:235
作者
Cheminod, Manuel [1 ]
Durante, Luca [1 ]
Valenzano, Adriano [1 ]
机构
[1] Natl Res Council Italy CNR, IEIIT, I-10129 Turin, Italy
关键词
Industrial networks; information security; network security; risk assessment; security analysis and monitoring; security countermeasures; INTRUSION-DETECTION; AUTHENTICATION SCHEME; BUILDING AUTOMATION; CONTROL-SYSTEMS; TREE ANALYSIS; RISK; SCADA; VULNERABILITY; FRAMEWORK; MANAGEMENT;
D O I
10.1109/TII.2012.2198666
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although awareness is constantly rising, that industrial computer networks (in a very broad sense) can be exposed to serious cyber threats, many people still think that the same countermeasures, developed to protect general-purpose computer networks, can be effectively adopted also in those situations where a physical system is managed/controlled through some distributed Information and Communication Technology (ICT) infrastructure. Unfortunately, this is not the case, as several examples of successful attacks carried out in the last decade, and more frequently in the very recent past, have dramatically shown. Experts in this area know very well that often the peculiarities of industrial networks prevent the adoption of classical approaches to their security and, in particular, of those popular solutions that are mainly based on a detect and patch philosophy. This paper is a contribution, from the security point of view, to the assessment of the current situation of a wide class of industrial distributed computing systems. In particular, the analysis presented in this paper takes into account the process of ensuring a satisfactory degree of security for a distributed industrial system, with respect to some key elements such as the system characteristics, the current state of the art of standardization and the adoption of suitable controls (countermeasures) that can help in lowering the security risks below a predefined, acceptable threshold.
引用
收藏
页码:277 / 293
页数:17
相关论文
共 103 条
[1]   A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems [J].
Alcaraz, Cristina ;
Lopez, Javier .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (04) :419-428
[2]   Event-tree analysis using binary decision diagrams [J].
Andrews, JD ;
Dunnett, SJ .
IEEE TRANSACTIONS ON RELIABILITY, 2000, 49 (02) :230-238
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], 27004 ISOIEC
[5]  
[Anonymous], 2010, NIST SP
[6]  
[Anonymous], 27003 ISOIEC
[7]  
[Anonymous], 27000 ISOIEC
[8]  
[Anonymous], 2005, 27002 ISOIEC
[9]  
[Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
[10]  
[Anonymous], P 43 IEEE HAW INT C